]>
Commit | Line | Data |
---|---|---|
cf298167 SG |
1 | menu "Boot options" |
2 | ||
3 | menu "Boot images" | |
4 | ||
5 | config ANDROID_BOOT_IMAGE | |
6 | bool "Enable support for Android Boot Images" | |
7 | default y if FASTBOOT | |
8 | help | |
9 | This enables support for booting images which use the Android | |
10 | image format header. | |
11 | ||
12 | config FIT | |
13 | bool "Support Flattened Image Tree" | |
92055e13 | 14 | select HASH |
cf298167 SG |
15 | select MD5 |
16 | select SHA1 | |
eb5171dd | 17 | imply SHA256 |
cf298167 SG |
18 | help |
19 | This option allows you to boot the new uImage structure, | |
20 | Flattened Image Tree. FIT is formally a FDT, which can include | |
21 | images of various types (kernel, FDT blob, ramdisk, etc.) | |
22 | in a single blob. To boot this new uImage structure, | |
23 | pass the address of the blob to the "bootm" command. | |
24 | FIT is very flexible, supporting compression, multiple images, | |
25 | multiple configurations, verification through hashing and also | |
26 | verified boot (secure boot using RSA). | |
27 | ||
d6b318de SG |
28 | config TIMESTAMP |
29 | bool "Show image date and time when displaying image information" | |
30 | default y if CMD_DATE | |
31 | help | |
32 | When CONFIG_TIMESTAMP is selected, the timestamp (date and time) of | |
33 | an image is printed by image commands like bootm or iminfo. This | |
34 | is shown as 'Timestamp: xxx' and 'Created: xxx'. If this option is | |
35 | enabled, then U-Boot requires FITs to have a timestamp. If a FIT is | |
36 | loaded that does not, the message 'Wrong FIT format: no timestamp' | |
37 | is shown. | |
38 | ||
cf298167 SG |
39 | config FIT_EXTERNAL_OFFSET |
40 | hex "FIT external data offset" | |
90c7888c | 41 | depends on FIT |
cf298167 SG |
42 | default 0x0 |
43 | help | |
44 | This specifies a data offset in fit image. | |
45 | The offset is from data payload offset to the beginning of | |
46 | fit image header. When specifies a offset, specific data | |
47 | could be put in the hole between data payload and fit image | |
48 | header, such as CSF data on i.MX platform. | |
49 | ||
6f3c2d8a SG |
50 | config FIT_FULL_CHECK |
51 | bool "Do a full check of the FIT before using it" | |
90c7888c | 52 | depends on FIT |
6f3c2d8a SG |
53 | default y |
54 | help | |
55 | Enable this do a full check of the FIT to make sure it is valid. This | |
56 | helps to protect against carefully crafted FITs which take advantage | |
57 | of bugs or omissions in the code. This includes a bad structure, | |
58 | multiple root nodes and the like. | |
59 | ||
cf298167 SG |
60 | config FIT_SIGNATURE |
61 | bool "Enable signature verification of FIT uImages" | |
90c7888c | 62 | depends on DM && FIT |
cf298167 | 63 | select HASH |
61416fe9 AG |
64 | imply RSA |
65 | imply RSA_VERIFY | |
cf298167 | 66 | select IMAGE_SIGN_INFO |
6f3c2d8a | 67 | select FIT_FULL_CHECK |
cf298167 SG |
68 | help |
69 | This option enables signature verification of FIT uImages, | |
70 | using a hash signed and verified using RSA. If | |
71 | CONFIG_SHA_PROG_HW_ACCEL is defined, i.e support for progressive | |
72 | hashing is available using hardware, then the RSA library will use | |
73 | it. See doc/uImage.FIT/signature.txt for more details. | |
74 | ||
75 | WARNING: When relying on signed FIT images with a required signature | |
76 | check the legacy image format is disabled by default, so that | |
77 | unsigned images cannot be loaded. If a board needs the legacy image | |
78 | format support in this case, enable it using | |
79 | CONFIG_LEGACY_IMAGE_FORMAT. | |
80 | ||
81 | config FIT_SIGNATURE_MAX_SIZE | |
82 | hex "Max size of signed FIT structures" | |
83 | depends on FIT_SIGNATURE | |
84 | default 0x10000000 | |
85 | help | |
86 | This option sets a max size in bytes for verified FIT uImages. | |
87 | A sane value of 256MB protects corrupted DTB structures from overlapping | |
88 | device memory. Assure this size does not extend past expected storage | |
89 | space. | |
90 | ||
ad74aed1 | 91 | config FIT_RSASSA_PSS |
cf298167 SG |
92 | bool "Support rsassa-pss signature scheme of FIT image contents" |
93 | depends on FIT_SIGNATURE | |
cf298167 SG |
94 | help |
95 | Enable this to support the pss padding algorithm as described | |
96 | in the rfc8017 (https://tools.ietf.org/html/rfc8017). | |
97 | ||
98 | config FIT_CIPHER | |
99 | bool "Enable ciphering data in a FIT uImages" | |
90c7888c | 100 | depends on DM && FIT |
cf298167 SG |
101 | select AES |
102 | help | |
103 | Enable the feature of data ciphering/unciphering in the tool mkimage | |
104 | and in the u-boot support of the FIT image. | |
105 | ||
106 | config FIT_VERBOSE | |
107 | bool "Show verbose messages when FIT images fail" | |
90c7888c | 108 | depends on FIT |
cf298167 SG |
109 | help |
110 | Generally a system will have valid FIT images so debug messages | |
111 | are a waste of code space. If you are debugging your images then | |
112 | you can enable this option to get more verbose information about | |
113 | failures. | |
114 | ||
115 | config FIT_BEST_MATCH | |
116 | bool "Select the best match for the kernel device tree" | |
90c7888c | 117 | depends on FIT |
cf298167 SG |
118 | help |
119 | When no configuration is explicitly selected, default to the | |
120 | one whose fdt's compatibility field best matches that of | |
121 | U-Boot itself. A match is considered "best" if it matches the | |
122 | most specific compatibility entry of U-Boot's fdt's root node. | |
123 | The order of entries in the configuration's fdt is ignored. | |
124 | ||
125 | config FIT_IMAGE_POST_PROCESS | |
126 | bool "Enable post-processing of FIT artifacts after loading by U-Boot" | |
90c7888c | 127 | depends on FIT |
1bc20897 | 128 | depends on TI_SECURE_DEVICE || SOCFPGA_SECURE_VAB_AUTH |
042e87e8 | 129 | default y if TI_SECURE_DEVICE |
cf298167 SG |
130 | help |
131 | Allows doing any sort of manipulation to blobs after they got extracted | |
132 | from FIT images like stripping off headers or modifying the size of the | |
133 | blob, verification, authentication, decryption etc. in a platform or | |
134 | board specific way. In order to use this feature a platform or board- | |
135 | specific implementation of board_fit_image_post_process() must be | |
136 | provided. Also, anything done during this post-processing step would | |
137 | need to be comprehended in how the images were prepared before being | |
138 | injected into the FIT creation (i.e. the blobs would have been pre- | |
139 | processed before being added to the FIT image). | |
140 | ||
7a01882e RH |
141 | config FIT_PRINT |
142 | bool "Support FIT printing" | |
90c7888c | 143 | depends on FIT |
7a01882e RH |
144 | default y |
145 | help | |
146 | Support printing the content of the fitImage in a verbose manner. | |
147 | ||
cf298167 SG |
148 | config SPL_FIT |
149 | bool "Support Flattened Image Tree within SPL" | |
90c7888c | 150 | depends on SPL && FIT |
92055e13 | 151 | select SPL_HASH |
cf298167 SG |
152 | select SPL_OF_LIBFDT |
153 | ||
154 | config SPL_FIT_PRINT | |
155 | bool "Support FIT printing within SPL" | |
156 | depends on SPL_FIT | |
157 | help | |
158 | Support printing the content of the fitImage in a verbose manner in SPL. | |
159 | ||
6f3c2d8a SG |
160 | config SPL_FIT_FULL_CHECK |
161 | bool "Do a full check of the FIT before using it" | |
90c7888c | 162 | depends on SPL_FIT |
6f3c2d8a SG |
163 | help |
164 | Enable this do a full check of the FIT to make sure it is valid. This | |
165 | helps to protect against carefully crafted FITs which take advantage | |
166 | of bugs or omissions in the code. This includes a bad structure, | |
167 | multiple root nodes and the like. | |
168 | ||
cf298167 SG |
169 | config SPL_FIT_SIGNATURE |
170 | bool "Enable signature verification of FIT firmware within SPL" | |
171 | depends on SPL_DM | |
bdb7f263 | 172 | depends on SPL_LOAD_FIT || SPL_LOAD_FIT_FULL |
6ce28132 | 173 | select FIT_SIGNATURE |
cf298167 | 174 | select SPL_FIT |
0c6bdbb9 | 175 | select SPL_CRYPTO |
07212096 | 176 | select SPL_HASH |
61416fe9 AG |
177 | imply SPL_RSA |
178 | imply SPL_RSA_VERIFY | |
cf298167 | 179 | select SPL_IMAGE_SIGN_INFO |
6f3c2d8a | 180 | select SPL_FIT_FULL_CHECK |
cf298167 | 181 | |
b53541f7 SG |
182 | config SPL_FIT_SIGNATURE_MAX_SIZE |
183 | hex "Max size of signed FIT structures in SPL" | |
184 | depends on SPL_FIT_SIGNATURE | |
185 | default 0x10000000 | |
186 | help | |
187 | This option sets a max size in bytes for verified FIT uImages. | |
188 | A sane value of 256MB protects corrupted DTB structures from overlapping | |
189 | device memory. Assure this size does not extend past expected storage | |
190 | space. | |
191 | ||
5d39c932 PR |
192 | config SPL_FIT_RSASSA_PSS |
193 | bool "Support rsassa-pss signature scheme of FIT image contents in SPL" | |
194 | depends on SPL_FIT_SIGNATURE | |
195 | help | |
196 | Enable this to support the pss padding algorithm as described | |
197 | in the rfc8017 (https://tools.ietf.org/html/rfc8017) in SPL. | |
198 | ||
cf298167 SG |
199 | config SPL_LOAD_FIT |
200 | bool "Enable SPL loading U-Boot as a FIT (basic fitImage features)" | |
90c7888c | 201 | depends on SPL && FIT |
cf298167 SG |
202 | select SPL_FIT |
203 | help | |
204 | Normally with the SPL framework a legacy image is generated as part | |
205 | of the build. This contains U-Boot along with information as to | |
206 | where it should be loaded. This option instead enables generation | |
207 | of a FIT (Flat Image Tree) which provides more flexibility. In | |
208 | particular it can handle selecting from multiple device tree | |
209 | and passing the correct one to U-Boot. | |
210 | ||
df51ae76 AG |
211 | This path has the following limitations: |
212 | ||
6e847f6d | 213 | 1. "loadables" images, other than FDTs, which do not have a "load" |
df51ae76 AG |
214 | property will not be loaded. This limitation also applies to FPGA |
215 | images with the correct "compatible" string. | |
a3a1afb7 OS |
216 | 2. For FPGA images, the supported "compatible" list is in the |
217 | doc/uImage.FIT/source_file_format.txt. | |
df51ae76 AG |
218 | 3. FDTs are only loaded for images with an "os" property of "u-boot". |
219 | "linux" images are also supported with Falcon boot mode. | |
220 | ||
cf298167 SG |
221 | config SPL_LOAD_FIT_ADDRESS |
222 | hex "load address of fit image" | |
90c7888c | 223 | depends on SPL_LOAD_FIT || SPL_RAM_SUPPORT || TPL_RAM_SUPPORT |
cf298167 SG |
224 | default 0x0 |
225 | help | |
226 | Specify the load address of the fit image that will be loaded | |
227 | by SPL. | |
228 | ||
229 | config SPL_LOAD_FIT_APPLY_OVERLAY | |
230 | bool "Enable SPL applying DT overlays from FIT" | |
231 | depends on SPL_LOAD_FIT | |
232 | select OF_LIBFDT_OVERLAY | |
233 | help | |
234 | The device tree is loaded from the FIT image. Allow the SPL is to | |
235 | also load device-tree overlays from the FIT image an apply them | |
236 | over the device tree. | |
237 | ||
238 | config SPL_LOAD_FIT_APPLY_OVERLAY_BUF_SZ | |
239 | depends on SPL_LOAD_FIT_APPLY_OVERLAY | |
240 | default 0x10000 | |
241 | hex "size of temporary buffer used to load the overlays" | |
242 | help | |
243 | The size of the area where the overlays will be loaded and | |
244 | uncompress. Must be at least as large as biggest overlay | |
245 | (uncompressed) | |
246 | ||
247 | config SPL_LOAD_FIT_FULL | |
248 | bool "Enable SPL loading U-Boot as a FIT (full fitImage features)" | |
90c7888c | 249 | depends on FIT |
cf298167 SG |
250 | select SPL_FIT |
251 | help | |
252 | Normally with the SPL framework a legacy image is generated as part | |
253 | of the build. This contains U-Boot along with information as to | |
254 | where it should be loaded. This option instead enables generation | |
255 | of a FIT (Flat Image Tree) which provides more flexibility. In | |
256 | particular it can handle selecting from multiple device tree | |
257 | and passing the correct one to U-Boot. | |
258 | ||
259 | config SPL_FIT_IMAGE_POST_PROCESS | |
260 | bool "Enable post-processing of FIT artifacts after loading by the SPL" | |
261 | depends on SPL_LOAD_FIT | |
042e87e8 | 262 | default y if TI_SECURE_DEVICE |
cf298167 SG |
263 | help |
264 | Allows doing any sort of manipulation to blobs after they got extracted | |
265 | from the U-Boot FIT image like stripping off headers or modifying the | |
266 | size of the blob, verification, authentication, decryption etc. in a | |
267 | platform or board specific way. In order to use this feature a platform | |
268 | or board-specific implementation of board_fit_image_post_process() must | |
269 | be provided. Also, anything done during this post-processing step would | |
270 | need to be comprehended in how the images were prepared before being | |
271 | injected into the FIT creation (i.e. the blobs would have been pre- | |
272 | processed before being added to the FIT image). | |
273 | ||
274 | config SPL_FIT_SOURCE | |
275 | string ".its source file for U-Boot FIT image" | |
276 | depends on SPL_FIT | |
277 | help | |
278 | Specifies a (platform specific) FIT source file to generate the | |
279 | U-Boot FIT image. This could specify further image to load and/or | |
280 | execute. | |
281 | ||
282 | config USE_SPL_FIT_GENERATOR | |
283 | bool "Use a script to generate the .its script" | |
90c7888c | 284 | depends on SPL_FIT |
31f35e83 | 285 | default y if SPL_FIT && ARCH_ZYNQMP |
cf298167 SG |
286 | |
287 | config SPL_FIT_GENERATOR | |
288 | string ".its file generator script for U-Boot FIT image" | |
289 | depends on USE_SPL_FIT_GENERATOR | |
cf298167 | 290 | default "arch/arm/mach-zynqmp/mkimage_fit_atf.sh" if SPL_LOAD_FIT && ARCH_ZYNQMP |
cf298167 SG |
291 | help |
292 | Specifies a (platform specific) script file to generate the FIT | |
293 | source file used to build the U-Boot FIT image file. This gets | |
294 | passed a list of supported device tree file stub names to | |
295 | include in the generated image. | |
296 | ||
4218456b SG |
297 | if VPL |
298 | ||
299 | config VPL_FIT | |
300 | bool "Support Flattened Image Tree within VPL" | |
301 | depends on VPL | |
302 | default y | |
303 | select VPL_HASH | |
304 | select VPL_OF_LIBFDT | |
305 | ||
306 | config VPL_FIT_PRINT | |
307 | bool "Support FIT printing within VPL" | |
308 | depends on VPL_FIT | |
309 | default y | |
310 | help | |
311 | Support printing the content of the fitImage in a verbose manner in VPL. | |
312 | ||
313 | config VPL_FIT_FULL_CHECK | |
314 | bool "Do a full check of the FIT before using it" | |
315 | default y | |
316 | help | |
317 | Enable this do a full check of the FIT to make sure it is valid. This | |
318 | helps to protect against carefully crafted FITs which take advantage | |
319 | of bugs or omissions in the code. This includes a bad structure, | |
320 | multiple root nodes and the like. | |
321 | ||
322 | config VPL_FIT_SIGNATURE | |
323 | bool "Enable signature verification of FIT firmware within VPL" | |
324 | depends on VPL_DM | |
4218456b SG |
325 | default y |
326 | select FIT_SIGNATURE | |
327 | select VPL_FIT | |
328 | select VPL_CRYPTO | |
329 | select VPL_HASH | |
330 | imply VPL_RSA | |
331 | imply VPL_RSA_VERIFY | |
332 | select VPL_IMAGE_SIGN_INFO | |
333 | select VPL_FIT_FULL_CHECK | |
334 | ||
335 | config VPL_FIT_SIGNATURE_MAX_SIZE | |
336 | hex "Max size of signed FIT structures in VPL" | |
337 | depends on VPL_FIT_SIGNATURE | |
338 | default 0x10000000 | |
339 | help | |
340 | This option sets a max size in bytes for verified FIT uImages. | |
341 | A sane value of 256MB protects corrupted DTB structures from overlapping | |
342 | device memory. Assure this size does not extend past expected storage | |
343 | space. | |
344 | ||
345 | endif # VPL | |
346 | ||
be43a35b JK |
347 | config PXE_UTILS |
348 | bool | |
349 | select MENU | |
350 | help | |
351 | Utilities for parsing PXE file formats. | |
352 | ||
ef5e3891 SG |
353 | config BOOTSTD |
354 | bool "Standard boot support" | |
355 | default y | |
356 | depends on DM && OF_CONTROL && BLK | |
357 | help | |
358 | U-Boot supports a standard way of locating something to boot, | |
359 | typically an Operating System such as Linux, provided by a distro such | |
360 | as Arch Linux or Debian. Enable this to support iterating through | |
361 | available bootdevs and using bootmeths to find bootflows suitable for | |
362 | booting. | |
363 | ||
364 | Standard boot is not a standard way of booting, just a framework | |
365 | within U-Boot for supporting all the different ways that exist. | |
366 | ||
367 | Terminology: | |
368 | ||
369 | - bootdev - a device which can hold a distro (e.g. MMC) | |
370 | - bootmeth - a method to scan a bootdev to find bootflows (owned by | |
371 | U-Boot) | |
372 | - bootflow - a description of how to boot (owned by the distro) | |
373 | ||
374 | config BOOTSTD_FULL | |
375 | bool "Enhanced features for standard boot" | |
376 | default y if SANDBOX | |
377 | help | |
378 | This enables various useful features for standard boot, which are not | |
379 | essential for operation: | |
380 | ||
381 | - bootdev, bootmeth commands | |
382 | - extra features in the bootflow command | |
383 | - support for selecting the ordering of bootmeths ("bootmeth order") | |
384 | - support for selecting the ordering of bootdevs using the devicetree | |
385 | as well as the "boot_targets" environment variable | |
386 | ||
4218456b SG |
387 | config SPL_BOOTSTD |
388 | bool "Standard boot support in VPL" | |
389 | depends on SPL && SPL_DM && SPL_OF_CONTROL && SPL_BLK | |
390 | default y if VPL | |
391 | help | |
392 | This enables standard boot in SPL. This is neeeded so that VBE | |
393 | (Verified Boot for Embedded) can be used, since it depends on standard | |
394 | boot. It is enabled by default since the main purpose of VPL is to | |
395 | handle the firmware part of VBE. | |
396 | ||
397 | config VPL_BOOTSTD | |
398 | bool "Standard boot support in VPL" | |
399 | depends on VPL && VPL_DM && VPL_OF_CONTROL && VPL_BLK | |
400 | default y | |
401 | help | |
402 | This enables standard boot in SPL. This is neeeded so that VBE | |
403 | (Verified Boot for Embedded) can be used, since it depends on standard | |
404 | boot. It is enabled by default since the main purpose of VPL is to | |
405 | handle the firmware part of VBE. | |
406 | ||
31aefaf8 SG |
407 | if BOOTSTD |
408 | ||
a91492b6 SG |
409 | config BOOTSTD_BOOTCOMMAND |
410 | bool "Use bootstd to boot" | |
411 | default y if !DISTRO_DEFAULTS | |
412 | help | |
413 | Enable this to select a default boot-command suitable for booting | |
414 | with standard boot. This can be overridden by the board if needed, | |
415 | but the default command should be enough for most boards which use | |
416 | standard boot. | |
417 | ||
418 | For now this is only selected if distro boot is NOT used, since | |
419 | standard boot does not support all of the features of distro boot | |
420 | yet. | |
421 | ||
bc06aa03 SG |
422 | config BOOTMETH_GLOBAL |
423 | bool | |
424 | help | |
425 | Add support for global bootmeths. This feature is used by VBE and | |
426 | EFI bootmgr, since they take full control over which bootdevs are | |
427 | selected to boot. | |
428 | ||
31aefaf8 SG |
429 | config BOOTMETH_DISTRO |
430 | bool "Bootdev support for distro boot" | |
be43a35b | 431 | select PXE_UTILS |
31aefaf8 SG |
432 | default y |
433 | help | |
434 | Enables support for distro boot using bootdevs. This makes the | |
435 | bootdevs look for a 'extlinux/extlinux.conf' on each filesystem | |
436 | they scan. | |
437 | ||
438 | This provides a way to try out standard boot on an existing boot flow. | |
439 | ||
dab2c285 SG |
440 | config BOOTMETH_DISTRO_PXE |
441 | bool "Bootdev support for distro boot over network" | |
442 | depends on CMD_PXE && CMD_NET && DM_ETH | |
443 | default y | |
444 | help | |
445 | Enables support for distro boot using bootdevs. This makes the | |
446 | bootdevs look for a 'extlinux/extlinux.conf' on the tftp server. | |
447 | ||
448 | This provides a way to try out standard boot on an existing boot flow. | |
449 | ||
acfa9bdf SG |
450 | config BOOTMETH_EFILOADER |
451 | bool "Bootdev support for EFI boot" | |
452 | depends on CMD_BOOTEFI | |
453 | default y | |
454 | help | |
455 | Enables support for EFI boot using bootdevs. This makes the | |
456 | bootdevs look for a 'boot<arch>.efi' on each filesystem | |
457 | they scan. The resulting file is booted after enabling U-Boot's | |
458 | EFI loader support. | |
459 | ||
460 | The <arch> depends on the architecture of the board: | |
461 | ||
462 | aa64 - aarch64 (ARM 64-bit) | |
463 | arm - ARM 32-bit | |
464 | ia32 - x86 32-bit | |
465 | x64 - x86 64-bit | |
466 | riscv32 - RISC-V 32-bit | |
467 | riscv64 - RISC-V 64-bit | |
468 | ||
469 | This provides a way to try out standard boot on an existing boot flow. | |
470 | ||
4c7418f3 SG |
471 | config BOOTMETH_VBE |
472 | bool "Bootdev support for Verified Boot for Embedded" | |
473 | depends on FIT | |
474 | default y | |
475 | select BOOTMETH_GLOBAL | |
448e2b63 | 476 | select EVENT |
4c7418f3 SG |
477 | help |
478 | Enables support for VBE boot. This is a standard boot method which | |
479 | supports selection of various firmware components, seleciton of an OS to | |
480 | boot as well as updating these using fwupd. | |
481 | ||
4218456b SG |
482 | config SPL_BOOTMETH_VBE |
483 | bool "Bootdev support for Verified Boot for Embedded (SPL)" | |
484 | depends on SPL && FIT | |
448e2b63 | 485 | select EVENT |
4218456b SG |
486 | default y if VPL |
487 | help | |
488 | Enables support for VBE boot. This is a standard boot method which | |
489 | supports selection of various firmware components, seleciton of an OS to | |
490 | boot as well as updating these using fwupd. | |
491 | ||
492 | config VPL_BOOTMETH_VBE | |
493 | bool "Bootdev support for Verified Boot for Embedded (VPL)" | |
494 | depends on VPL && FIT | |
448e2b63 | 495 | select EVENT |
4218456b SG |
496 | default y |
497 | help | |
498 | Enables support for VBE boot. This is a standard boot method which | |
499 | supports selection of various firmware components, seleciton of an OS to | |
500 | boot as well as updating these using fwupd. | |
501 | ||
cb47e21a SG |
502 | if BOOTMETH_VBE |
503 | ||
504 | config BOOTMETH_VBE_SIMPLE | |
505 | bool "Bootdev support for VBE 'simple' method" | |
506 | default y | |
507 | help | |
508 | Enables support for VBE 'simple' boot. This allows updating a single | |
509 | firmware image in boot media such as MMC. It does not support any sort | |
510 | of rollback, recovery or A/B boot. | |
511 | ||
4218456b SG |
512 | config BOOTMETH_VBE_SIMPLE_OS |
513 | bool "Bootdev support for VBE 'simple' method OS phase" | |
514 | default y | |
515 | help | |
516 | Enables support for the OS parts of VBE 'simple' boot. This includes | |
517 | fixing up the device tree with the required VBE information, ready | |
518 | for booting into the OS. This option is only enabled for U-Boot | |
519 | proper, since it is the phase where device tree fixups happen. | |
520 | ||
521 | config SPL_BOOTMETH_VBE_SIMPLE | |
522 | bool "Bootdev support for VBE 'simple' method (SPL)" | |
523 | depends on SPL | |
524 | default y if VPL | |
525 | help | |
526 | Enables support for VBE 'simple' boot. This allows updating a single | |
527 | firmware image in boot media such as MMC. It does not support any sort | |
528 | of rollback, recovery or A/B boot. | |
529 | ||
530 | config VPL_BOOTMETH_VBE_SIMPLE | |
531 | bool "Bootdev support for VBE 'simple' method (VPL)" | |
532 | depends on VPL | |
533 | default y | |
534 | help | |
535 | Enables support for VBE 'simple' boot. This allows updating a single | |
536 | firmware image in boot media such as MMC. It does not support any sort | |
537 | of rollback, recovery or A/B boot. | |
538 | ||
539 | config SPL_BOOTMETH_VBE_SIMPLE_FW | |
540 | bool "Bootdev support for VBE 'simple' method firmware phase (SPL)" | |
541 | depends on VPL | |
542 | default y | |
543 | help | |
544 | Enables support for the firmware parts of VBE 'simple' boot. This | |
545 | includes an SPL loader which locates the correct U-Boot to boot into. | |
546 | This option should really only be enabled for VPL, since it is the | |
547 | phase where the SPL + U-Boot decision should be made. But for now, | |
548 | SPL does its own FIT-configuration selection. | |
549 | ||
550 | config VPL_BOOTMETH_VBE_SIMPLE_FW | |
551 | bool "Bootdev support for VBE 'simple' method firmware phase (VPL)" | |
552 | depends on VPL | |
553 | default y | |
554 | help | |
555 | Enables support for the firmware parts of VBE 'simple' boot. This | |
556 | includes an SPL loader which locates the correct SPL to boot into. | |
557 | This option enabled for VPL, since it is the phase where the SPL | |
558 | decision is made. | |
559 | ||
cb47e21a SG |
560 | endif # BOOTMETH_VBE |
561 | ||
87c6f8a4 SG |
562 | config EXPO |
563 | bool "Support for expos - groups of scenes displaying a UI" | |
564 | default y if BOOTMETH_VBE | |
565 | help | |
566 | An expo is a way of presenting and collecting information from the | |
567 | user. It consists of a collection of 'scenes' of which only one is | |
568 | presented at a time. An expo is typically used to show a boot menu | |
569 | and allow settings to be changed. | |
570 | ||
571 | The expo can be presented in graphics form using a vidconsole, or in | |
572 | text form on a serial console. | |
573 | ||
126947b7 SG |
574 | config BOOTMETH_SANDBOX |
575 | def_bool y | |
576 | depends on SANDBOX | |
577 | help | |
578 | This is a sandbox bootmeth driver used for testing. It always returns | |
579 | -ENOTSUPP when attempting to boot. | |
580 | ||
d9409244 SG |
581 | config BOOTMETH_SCRIPT |
582 | bool "Bootdev support for U-Boot scripts" | |
583 | default y if BOOTSTD_FULL | |
584 | help | |
585 | Enables support for booting a distro via a U-Boot script. This makes | |
586 | the bootdevs look for a 'boot/boot.scr' file which can be used to | |
587 | boot the distro. | |
588 | ||
589 | This provides a way to try out standard boot on an existing boot flow. | |
590 | It is not enabled by default to save space. | |
591 | ||
31aefaf8 SG |
592 | endif |
593 | ||
cf298167 SG |
594 | config LEGACY_IMAGE_FORMAT |
595 | bool "Enable support for the legacy image format" | |
52dc3343 | 596 | default y if !FIT_SIGNATURE && !TI_SECURE_DEVICE |
cf298167 SG |
597 | help |
598 | This option enables the legacy image format. It is enabled by | |
599 | default for backward compatibility, unless FIT_SIGNATURE is | |
600 | set where it is disabled so that unsigned images cannot be | |
601 | loaded. If a board needs the legacy image format support in this | |
602 | case, enable it here. | |
603 | ||
aefa34f5 SG |
604 | config SUPPORT_RAW_INITRD |
605 | bool "Enable raw initrd images" | |
606 | help | |
607 | Note, defining the SUPPORT_RAW_INITRD allows user to supply | |
608 | kernel with raw initrd images. The syntax is slightly different, the | |
609 | address of the initrd must be augmented by it's size, in the following | |
610 | format: "<initrd address>:<initrd size>". | |
611 | ||
cf298167 SG |
612 | config OF_BOARD_SETUP |
613 | bool "Set up board-specific details in device tree before boot" | |
614 | depends on OF_LIBFDT | |
615 | help | |
616 | This causes U-Boot to call ft_board_setup() before booting into | |
617 | the Operating System. This function can set up various | |
618 | board-specific information in the device tree for use by the OS. | |
619 | The device tree is then passed to the OS. | |
620 | ||
621 | config OF_SYSTEM_SETUP | |
622 | bool "Set up system-specific details in device tree before boot" | |
623 | depends on OF_LIBFDT | |
624 | help | |
625 | This causes U-Boot to call ft_system_setup() before booting into | |
626 | the Operating System. This function can set up various | |
627 | system-specific information in the device tree for use by the OS. | |
628 | The device tree is then passed to the OS. | |
629 | ||
630 | config OF_STDOUT_VIA_ALIAS | |
631 | bool "Update the device-tree stdout alias from U-Boot" | |
632 | depends on OF_LIBFDT | |
633 | help | |
634 | This uses U-Boot's serial alias from the aliases node to update | |
635 | the device tree passed to the OS. The "linux,stdout-path" property | |
636 | in the chosen node is set to point to the correct serial node. | |
637 | This option currently references CONFIG_CONS_INDEX, which is | |
638 | incorrect when used with device tree as this option does not | |
639 | exist / should not be used. | |
640 | ||
98463903 | 641 | config HAVE_TEXT_BASE |
cf298167 SG |
642 | bool |
643 | depends on !NIOS2 && !XTENSA | |
644 | depends on !EFI_APP | |
645 | default y | |
646 | ||
98463903 SG |
647 | config TEXT_BASE |
648 | depends on HAVE_TEXT_BASE | |
55adabbb | 649 | default 0x0 if POSITION_INDEPENDENT |
cf298167 | 650 | default 0x80800000 if ARCH_OMAP2PLUS || ARCH_K3 |
b6ffd58e IZ |
651 | default 0x81700000 if MACH_SUNIV |
652 | default 0x2a000000 if MACH_SUN9I | |
1bf98bd4 AP |
653 | default 0x4a000000 if SUNXI_MINIMUM_DRAM_MB >= 256 |
654 | default 0x42e00000 if SUNXI_MINIMUM_DRAM_MB >= 64 | |
cf298167 SG |
655 | hex "Text Base" |
656 | help | |
657 | The address in memory that U-Boot will be running from, initially. | |
658 | ||
e4d741f8 TR |
659 | config HAVE_SYS_MONITOR_BASE |
660 | bool | |
661 | depends on ARC || MIPS || M68K || NIOS2 || PPC || XTENSA || X86 \ | |
cc1015f4 | 662 | || ENV_IS_IN_FLASH || MTD_NOR_FLASH |
e4d741f8 TR |
663 | depends on !EFI_APP |
664 | default y | |
665 | ||
666 | config SYS_MONITOR_BASE | |
667 | depends on HAVE_SYS_MONITOR_BASE | |
668 | hex "Physical start address of boot monitor code" | |
98463903 | 669 | default TEXT_BASE |
e4d741f8 TR |
670 | help |
671 | The physical start address of boot monitor code (which is the same as | |
65cc0e2a | 672 | CONFIG_TEXT_BASE when linking) and the same as CFG_SYS_FLASH_BASE |
e4d741f8 TR |
673 | when booting from flash. |
674 | ||
675 | config SPL_SYS_MONITOR_BASE | |
676 | depends on MPC85xx && SPL && HAVE_SYS_MONITOR_BASE | |
677 | hex "Physical start address of SPL monitor code" | |
678 | default SPL_TEXT_BASE | |
679 | ||
680 | config TPL_SYS_MONITOR_BASE | |
681 | depends on MPC85xx && TPL && HAVE_SYS_MONITOR_BASE | |
682 | hex "Physical start address of TPL monitor code" | |
683 | ||
2f8a6db5 TR |
684 | config DYNAMIC_SYS_CLK_FREQ |
685 | bool "Determine CPU clock frequency at run-time" | |
686 | help | |
687 | Implement a get_board_sys_clk function that will determine the CPU | |
688 | clock frequency at run time, rather than define it statically. | |
689 | ||
cf298167 | 690 | config SYS_CLK_FREQ |
2f8a6db5 | 691 | depends on !DYNAMIC_SYS_CLK_FREQ |
cf298167 | 692 | int "CPU clock frequency" |
2f8a6db5 TR |
693 | default 125000000 if ARCH_LS1012A |
694 | default 100000000 if ARCH_P2020 || ARCH_T1024 || ARCH_T1042 || \ | |
695 | ARCH_LS1021A || FSL_LSCH2 || FSL_LSCH3 | |
696 | default 66666666 if ARCH_P1010 || ARCH_P1020 || ARCH_T4240 | |
697 | default 66660000 if ARCH_T2080 | |
698 | default 33333333 if RCAR_GEN3 | |
699 | default 24000000 if ARCH_EXYNOS | |
700 | default 20000000 if RCAR_GEN2 | |
701 | default 0 | |
702 | help | |
703 | A static value for the CPU frequency. Note that if not required | |
704 | for a given SoC, this can be left at 0. | |
cf298167 SG |
705 | |
706 | config ARCH_FIXUP_FDT_MEMORY | |
707 | bool "Enable arch_fixup_memory_banks() call" | |
708 | default y | |
709 | help | |
710 | Enable FDT memory map syncup before OS boot. This feature can be | |
711 | used for booting OS with different memory setup where the part of | |
712 | the memory location should be used for different purpose. | |
713 | ||
96d0aa91 SG |
714 | config CHROMEOS |
715 | bool "Support booting Chrome OS" | |
716 | help | |
717 | Chrome OS requires U-Boot to set up a table indicating the boot mode | |
718 | (e.g. Developer mode) and a few other things. Enable this if you are | |
719 | booting on a Chromebook to avoid getting an error about an invalid | |
720 | firmware ID. | |
721 | ||
722 | config CHROMEOS_VBOOT | |
723 | bool "Support Chrome OS verified boot" | |
724 | help | |
725 | This is intended to enable the full Chrome OS verified boot support | |
726 | in U-Boot. It is not actually implemented in the U-Boot source code | |
727 | at present, so this option is always set to 'n'. It allows | |
728 | distinguishing between booting Chrome OS in a basic way (developer | |
729 | mode) and a full boot. | |
730 | ||
5a446186 TR |
731 | config SYS_RAMBOOT |
732 | bool | |
733 | ||
d8ef01e9 TR |
734 | config RAMBOOT_PBL |
735 | bool "Freescale PBL(pre-boot loader) image format support" | |
5a446186 | 736 | select SYS_RAMBOOT if PPC |
d8ef01e9 TR |
737 | help |
738 | Some SoCs use PBL to load RCW and/or pre-initialization instructions. | |
739 | For more details refer to doc/README.pblimage | |
740 | ||
d433c74e | 741 | choice |
ec9efcf6 | 742 | prompt "Freescale PBL (or predecessor) load location" |
d433c74e TR |
743 | depends on RAMBOOT_PBL || ((TARGET_P1010RDB_PA || TARGET_P1010RDB_PB \ |
744 | || TARGET_P1020RDB_PC || TARGET_P1020RDB_PD || TARGET_P2020RDB) \ | |
745 | && !CMD_NAND) | |
746 | ||
747 | config SDCARD | |
ec9efcf6 | 748 | bool "Freescale PBL (or similar) is found on SD card" |
d433c74e TR |
749 | |
750 | config SPIFLASH | |
ec9efcf6 TR |
751 | bool "Freescale PBL (or similar) is found on SPI flash" |
752 | ||
753 | config NO_PBL | |
754 | bool "Freescale PBL (or similar) is not used in this case" | |
d433c74e TR |
755 | |
756 | endchoice | |
757 | ||
d8e84617 TR |
758 | config FSL_FIXED_MMC_LOCATION |
759 | bool "PBL MMC is at a fixed location" | |
760 | depends on SDCARD && !RAMBOOT_PBL | |
761 | ||
762 | config ESDHC_HC_BLK_ADDR | |
763 | def_bool y | |
764 | depends on FSL_FIXED_MMC_LOCATION && (ARCH_BSC9131 || ARCH_BSC9132 || ARCH_P1010) | |
765 | help | |
766 | In High Capacity SD Cards (> 2 GBytes), the 32-bit source address and | |
767 | code length of these soc specify the memory address in block address | |
768 | format. Block length is fixed to 512 bytes as per the SD High | |
769 | Capacity specification. | |
770 | ||
d8ef01e9 TR |
771 | config SYS_FSL_PBL_PBI |
772 | string "PBI(pre-boot instructions) commands for the PBL image" | |
773 | depends on RAMBOOT_PBL | |
774 | help | |
775 | PBI commands can be used to configure SoC before it starts the execution. | |
776 | Please refer doc/README.pblimage for more details. | |
777 | ||
778 | config SYS_FSL_PBL_RCW | |
779 | string "Aadditional RCW (Power on reset configuration) for the PBL image" | |
780 | depends on RAMBOOT_PBL | |
781 | help | |
782 | Enables addition of RCW (Power on reset configuration) in built image. | |
783 | Please refer doc/README.pblimage for more details. | |
784 | ||
bb20a105 TR |
785 | config SYS_BOOT_RAMDISK_HIGH |
786 | depends on CMD_BOOTM || CMD_BOOTI || CMD_BOOTZ | |
787 | depends on !(NIOS2 || SANDBOX || SH || XTENSA) | |
788 | def_bool y | |
789 | help | |
790 | Enable initrd_high functionality. If defined then the initrd_high | |
791 | feature is enabled and the boot* ramdisk subcommand is enabled. | |
792 | ||
cf298167 SG |
793 | endmenu # Boot images |
794 | ||
75e65cc7 SG |
795 | menu "Boot timing" |
796 | ||
797 | config BOOTSTAGE | |
798 | bool "Boot timing and reporting" | |
799 | help | |
800 | Enable recording of boot time while booting. To use it, insert | |
801 | calls to bootstage_mark() with a suitable BOOTSTAGE_ID from | |
802 | bootstage.h. Only a single entry is recorded for each ID. You can | |
803 | give the entry a name with bootstage_mark_name(). You can also | |
804 | record elapsed time in a particular stage using bootstage_start() | |
805 | before starting and bootstage_accum() when finished. Bootstage will | |
806 | add up all the accumulated time and report it. | |
807 | ||
808 | Normally, IDs are defined in bootstage.h but a small number of | |
809 | additional 'user' IDs can be used by passing BOOTSTAGE_ID_ALLOC | |
810 | as the ID. | |
811 | ||
812 | Calls to show_boot_progress() will also result in log entries but | |
813 | these will not have names. | |
814 | ||
815 | config SPL_BOOTSTAGE | |
816 | bool "Boot timing and reported in SPL" | |
b340199f | 817 | depends on BOOTSTAGE && SPL |
75e65cc7 SG |
818 | help |
819 | Enable recording of boot time in SPL. To make this visible to U-Boot | |
820 | proper, enable BOOTSTAGE_STASH as well. This will stash the timing | |
821 | information when SPL finishes and load it when U-Boot proper starts | |
822 | up. | |
823 | ||
824 | config TPL_BOOTSTAGE | |
825 | bool "Boot timing and reported in TPL" | |
8bea4bf7 | 826 | depends on BOOTSTAGE && TPL |
75e65cc7 SG |
827 | help |
828 | Enable recording of boot time in SPL. To make this visible to U-Boot | |
829 | proper, enable BOOTSTAGE_STASH as well. This will stash the timing | |
830 | information when TPL finishes and load it when U-Boot proper starts | |
831 | up. | |
832 | ||
833 | config BOOTSTAGE_REPORT | |
834 | bool "Display a detailed boot timing report before booting the OS" | |
835 | depends on BOOTSTAGE | |
836 | help | |
837 | Enable output of a boot time report just before the OS is booted. | |
838 | This shows how long it took U-Boot to go through each stage of the | |
839 | boot process. The report looks something like this: | |
840 | ||
841 | Timer summary in microseconds: | |
842 | Mark Elapsed Stage | |
843 | 0 0 reset | |
844 | 3,575,678 3,575,678 board_init_f start | |
845 | 3,575,695 17 arch_cpu_init A9 | |
846 | 3,575,777 82 arch_cpu_init done | |
847 | 3,659,598 83,821 board_init_r start | |
848 | 3,910,375 250,777 main_loop | |
849 | 29,916,167 26,005,792 bootm_start | |
850 | 30,361,327 445,160 start_kernel | |
851 | ||
852 | config BOOTSTAGE_RECORD_COUNT | |
853 | int "Number of boot stage records to store" | |
939b04e9 | 854 | depends on BOOTSTAGE |
75e65cc7 SG |
855 | default 30 |
856 | help | |
857 | This is the size of the bootstage record list and is the maximum | |
858 | number of bootstage records that can be recorded. | |
859 | ||
860 | config SPL_BOOTSTAGE_RECORD_COUNT | |
861 | int "Number of boot stage records to store for SPL" | |
939b04e9 | 862 | depends on SPL_BOOTSTAGE |
75e65cc7 SG |
863 | default 5 |
864 | help | |
865 | This is the size of the bootstage record list and is the maximum | |
866 | number of bootstage records that can be recorded. | |
867 | ||
868 | config TPL_BOOTSTAGE_RECORD_COUNT | |
869 | int "Number of boot stage records to store for TPL" | |
939b04e9 | 870 | depends on TPL_BOOTSTAGE |
75e65cc7 SG |
871 | default 5 |
872 | help | |
873 | This is the size of the bootstage record list and is the maximum | |
874 | number of bootstage records that can be recorded. | |
875 | ||
876 | config BOOTSTAGE_FDT | |
877 | bool "Store boot timing information in the OS device tree" | |
878 | depends on BOOTSTAGE | |
879 | help | |
880 | Stash the bootstage information in the FDT. A root 'bootstage' | |
881 | node is created with each bootstage id as a child. Each child | |
882 | has a 'name' property and either 'mark' containing the | |
883 | mark time in microseconds, or 'accum' containing the | |
884 | accumulated time for that bootstage id in microseconds. | |
885 | For example: | |
886 | ||
887 | bootstage { | |
888 | 154 { | |
889 | name = "board_init_f"; | |
890 | mark = <3575678>; | |
891 | }; | |
892 | 170 { | |
893 | name = "lcd"; | |
894 | accum = <33482>; | |
895 | }; | |
896 | }; | |
897 | ||
898 | Code in the Linux kernel can find this in /proc/devicetree. | |
899 | ||
900 | config BOOTSTAGE_STASH | |
901 | bool "Stash the boot timing information in memory before booting OS" | |
902 | depends on BOOTSTAGE | |
903 | help | |
904 | Some OSes do not support device tree. Bootstage can instead write | |
905 | the boot timing information in a binary format at a given address. | |
906 | This happens through a call to bootstage_stash(), typically in | |
907 | the CPU's cleanup_before_linux() function. You can use the | |
908 | 'bootstage stash' and 'bootstage unstash' commands to do this on | |
909 | the command line. | |
910 | ||
911 | config BOOTSTAGE_STASH_ADDR | |
912 | hex "Address to stash boot timing information" | |
913 | default 0 | |
914 | help | |
915 | Provide an address which will not be overwritten by the OS when it | |
916 | starts, so that it can read this information when ready. | |
917 | ||
918 | config BOOTSTAGE_STASH_SIZE | |
919 | hex "Size of boot timing stash region" | |
920 | default 0x1000 | |
921 | help | |
922 | This should be large enough to hold the bootstage stash. A value of | |
923 | 4096 (4KiB) is normally plenty. | |
924 | ||
925 | config SHOW_BOOT_PROGRESS | |
926 | bool "Show boot progress in a board-specific manner" | |
927 | help | |
928 | Defining this option allows to add some board-specific code (calling | |
929 | a user-provided function show_boot_progress(int) that enables you to | |
930 | show the system's boot progress on some display (for example, some | |
931 | LEDs) on your board. At the moment, the following checkpoints are | |
932 | implemented: | |
933 | ||
934 | Legacy uImage format: | |
935 | ||
936 | Arg Where When | |
937 | 1 common/cmd_bootm.c before attempting to boot an image | |
938 | -1 common/cmd_bootm.c Image header has bad magic number | |
939 | 2 common/cmd_bootm.c Image header has correct magic number | |
940 | -2 common/cmd_bootm.c Image header has bad checksum | |
941 | 3 common/cmd_bootm.c Image header has correct checksum | |
942 | -3 common/cmd_bootm.c Image data has bad checksum | |
943 | 4 common/cmd_bootm.c Image data has correct checksum | |
944 | -4 common/cmd_bootm.c Image is for unsupported architecture | |
945 | 5 common/cmd_bootm.c Architecture check OK | |
946 | -5 common/cmd_bootm.c Wrong Image Type (not kernel, multi) | |
947 | 6 common/cmd_bootm.c Image Type check OK | |
948 | -6 common/cmd_bootm.c gunzip uncompression error | |
949 | -7 common/cmd_bootm.c Unimplemented compression type | |
950 | 7 common/cmd_bootm.c Uncompression OK | |
951 | 8 common/cmd_bootm.c No uncompress/copy overwrite error | |
952 | -9 common/cmd_bootm.c Unsupported OS (not Linux, BSD, VxWorks, QNX) | |
953 | ||
954 | 9 common/image.c Start initial ramdisk verification | |
955 | -10 common/image.c Ramdisk header has bad magic number | |
956 | -11 common/image.c Ramdisk header has bad checksum | |
957 | 10 common/image.c Ramdisk header is OK | |
958 | -12 common/image.c Ramdisk data has bad checksum | |
959 | 11 common/image.c Ramdisk data has correct checksum | |
960 | 12 common/image.c Ramdisk verification complete, start loading | |
961 | -13 common/image.c Wrong Image Type (not PPC Linux ramdisk) | |
962 | 13 common/image.c Start multifile image verification | |
963 | 14 common/image.c No initial ramdisk, no multifile, continue. | |
964 | ||
965 | 15 arch/<arch>/lib/bootm.c All preparation done, transferring control to OS | |
966 | ||
967 | -30 arch/powerpc/lib/board.c Fatal error, hang the system | |
968 | -31 post/post.c POST test failed, detected by post_output_backlog() | |
969 | -32 post/post.c POST test failed, detected by post_run_single() | |
970 | ||
971 | 34 common/cmd_doc.c before loading a Image from a DOC device | |
972 | -35 common/cmd_doc.c Bad usage of "doc" command | |
973 | 35 common/cmd_doc.c correct usage of "doc" command | |
974 | -36 common/cmd_doc.c No boot device | |
975 | 36 common/cmd_doc.c correct boot device | |
976 | -37 common/cmd_doc.c Unknown Chip ID on boot device | |
977 | 37 common/cmd_doc.c correct chip ID found, device available | |
978 | -38 common/cmd_doc.c Read Error on boot device | |
979 | 38 common/cmd_doc.c reading Image header from DOC device OK | |
980 | -39 common/cmd_doc.c Image header has bad magic number | |
981 | 39 common/cmd_doc.c Image header has correct magic number | |
982 | -40 common/cmd_doc.c Error reading Image from DOC device | |
983 | 40 common/cmd_doc.c Image header has correct magic number | |
984 | 41 common/cmd_ide.c before loading a Image from a IDE device | |
985 | -42 common/cmd_ide.c Bad usage of "ide" command | |
986 | 42 common/cmd_ide.c correct usage of "ide" command | |
987 | -43 common/cmd_ide.c No boot device | |
988 | 43 common/cmd_ide.c boot device found | |
989 | -44 common/cmd_ide.c Device not available | |
990 | 44 common/cmd_ide.c Device available | |
991 | -45 common/cmd_ide.c wrong partition selected | |
992 | 45 common/cmd_ide.c partition selected | |
993 | -46 common/cmd_ide.c Unknown partition table | |
994 | 46 common/cmd_ide.c valid partition table found | |
995 | -47 common/cmd_ide.c Invalid partition type | |
996 | 47 common/cmd_ide.c correct partition type | |
997 | -48 common/cmd_ide.c Error reading Image Header on boot device | |
998 | 48 common/cmd_ide.c reading Image Header from IDE device OK | |
999 | -49 common/cmd_ide.c Image header has bad magic number | |
1000 | 49 common/cmd_ide.c Image header has correct magic number | |
1001 | -50 common/cmd_ide.c Image header has bad checksum | |
1002 | 50 common/cmd_ide.c Image header has correct checksum | |
1003 | -51 common/cmd_ide.c Error reading Image from IDE device | |
1004 | 51 common/cmd_ide.c reading Image from IDE device OK | |
1005 | 52 common/cmd_nand.c before loading a Image from a NAND device | |
1006 | -53 common/cmd_nand.c Bad usage of "nand" command | |
1007 | 53 common/cmd_nand.c correct usage of "nand" command | |
1008 | -54 common/cmd_nand.c No boot device | |
1009 | 54 common/cmd_nand.c boot device found | |
1010 | -55 common/cmd_nand.c Unknown Chip ID on boot device | |
1011 | 55 common/cmd_nand.c correct chip ID found, device available | |
1012 | -56 common/cmd_nand.c Error reading Image Header on boot device | |
1013 | 56 common/cmd_nand.c reading Image Header from NAND device OK | |
1014 | -57 common/cmd_nand.c Image header has bad magic number | |
1015 | 57 common/cmd_nand.c Image header has correct magic number | |
1016 | -58 common/cmd_nand.c Error reading Image from NAND device | |
1017 | 58 common/cmd_nand.c reading Image from NAND device OK | |
1018 | ||
1019 | -60 common/env_common.c Environment has a bad CRC, using default | |
1020 | ||
1021 | 64 net/eth.c starting with Ethernet configuration. | |
1022 | -64 net/eth.c no Ethernet found. | |
1023 | 65 net/eth.c Ethernet found. | |
1024 | ||
1025 | -80 common/cmd_net.c usage wrong | |
1026 | 80 common/cmd_net.c before calling net_loop() | |
1027 | -81 common/cmd_net.c some error in net_loop() occurred | |
1028 | 81 common/cmd_net.c net_loop() back without error | |
1029 | -82 common/cmd_net.c size == 0 (File with size 0 loaded) | |
1030 | 82 common/cmd_net.c trying automatic boot | |
1031 | 83 common/cmd_net.c running "source" command | |
1032 | -83 common/cmd_net.c some error in automatic boot or "source" command | |
1033 | 84 common/cmd_net.c end without errors | |
1034 | ||
1035 | FIT uImage format: | |
1036 | ||
1037 | Arg Where When | |
1038 | 100 common/cmd_bootm.c Kernel FIT Image has correct format | |
1039 | -100 common/cmd_bootm.c Kernel FIT Image has incorrect format | |
1040 | 101 common/cmd_bootm.c No Kernel subimage unit name, using configuration | |
1041 | -101 common/cmd_bootm.c Can't get configuration for kernel subimage | |
1042 | 102 common/cmd_bootm.c Kernel unit name specified | |
1043 | -103 common/cmd_bootm.c Can't get kernel subimage node offset | |
1044 | 103 common/cmd_bootm.c Found configuration node | |
1045 | 104 common/cmd_bootm.c Got kernel subimage node offset | |
1046 | -104 common/cmd_bootm.c Kernel subimage hash verification failed | |
1047 | 105 common/cmd_bootm.c Kernel subimage hash verification OK | |
1048 | -105 common/cmd_bootm.c Kernel subimage is for unsupported architecture | |
1049 | 106 common/cmd_bootm.c Architecture check OK | |
1050 | -106 common/cmd_bootm.c Kernel subimage has wrong type | |
1051 | 107 common/cmd_bootm.c Kernel subimage type OK | |
1052 | -107 common/cmd_bootm.c Can't get kernel subimage data/size | |
1053 | 108 common/cmd_bootm.c Got kernel subimage data/size | |
1054 | -108 common/cmd_bootm.c Wrong image type (not legacy, FIT) | |
1055 | -109 common/cmd_bootm.c Can't get kernel subimage type | |
1056 | -110 common/cmd_bootm.c Can't get kernel subimage comp | |
1057 | -111 common/cmd_bootm.c Can't get kernel subimage os | |
1058 | -112 common/cmd_bootm.c Can't get kernel subimage load address | |
1059 | -113 common/cmd_bootm.c Image uncompress/copy overwrite error | |
1060 | ||
1061 | 120 common/image.c Start initial ramdisk verification | |
1062 | -120 common/image.c Ramdisk FIT image has incorrect format | |
1063 | 121 common/image.c Ramdisk FIT image has correct format | |
1064 | 122 common/image.c No ramdisk subimage unit name, using configuration | |
1065 | -122 common/image.c Can't get configuration for ramdisk subimage | |
1066 | 123 common/image.c Ramdisk unit name specified | |
1067 | -124 common/image.c Can't get ramdisk subimage node offset | |
1068 | 125 common/image.c Got ramdisk subimage node offset | |
1069 | -125 common/image.c Ramdisk subimage hash verification failed | |
1070 | 126 common/image.c Ramdisk subimage hash verification OK | |
1071 | -126 common/image.c Ramdisk subimage for unsupported architecture | |
1072 | 127 common/image.c Architecture check OK | |
1073 | -127 common/image.c Can't get ramdisk subimage data/size | |
1074 | 128 common/image.c Got ramdisk subimage data/size | |
1075 | 129 common/image.c Can't get ramdisk load address | |
1076 | -129 common/image.c Got ramdisk load address | |
1077 | ||
1078 | -130 common/cmd_doc.c Incorrect FIT image format | |
1079 | 131 common/cmd_doc.c FIT image format OK | |
1080 | ||
1081 | -140 common/cmd_ide.c Incorrect FIT image format | |
1082 | 141 common/cmd_ide.c FIT image format OK | |
1083 | ||
1084 | -150 common/cmd_nand.c Incorrect FIT image format | |
1085 | 151 common/cmd_nand.c FIT image format OK | |
1086 | ||
b55881dd | 1087 | config SPL_SHOW_BOOT_PROGRESS |
c1df3d54 | 1088 | bool "Show boot progress in a board-specific manner in SPL" |
b55881dd MV |
1089 | depends on SPL |
1090 | help | |
1091 | Defining this option allows to add some board-specific code (calling | |
1092 | a user-provided function show_boot_progress(int) that enables you to | |
1093 | show the system's boot progress on some display (for example, some | |
1094 | LEDs) on your board. For details see SHOW_BOOT_PROGRESS. | |
1095 | ||
75e65cc7 SG |
1096 | endmenu |
1097 | ||
7b6baa33 SG |
1098 | menu "Boot media" |
1099 | ||
1100 | config NOR_BOOT | |
1101 | bool "Support for booting from NOR flash" | |
1102 | depends on NOR | |
1103 | help | |
1104 | Enabling this will make a U-Boot binary that is capable of being | |
1105 | booted via NOR. In this case we will enable certain pinmux early | |
1106 | as the ROM only partially sets up pinmux. We also default to using | |
1107 | NOR for environment. | |
1108 | ||
1109 | config NAND_BOOT | |
1110 | bool "Support for booting from NAND flash" | |
7b6baa33 SG |
1111 | imply MTD_RAW_NAND |
1112 | help | |
1113 | Enabling this will make a U-Boot binary that is capable of being | |
1114 | booted via NAND flash. This is not a must, some SoCs need this, | |
1115 | some not. | |
1116 | ||
1117 | config ONENAND_BOOT | |
1118 | bool "Support for booting from ONENAND" | |
7b6baa33 SG |
1119 | imply MTD_RAW_NAND |
1120 | help | |
1121 | Enabling this will make a U-Boot binary that is capable of being | |
1122 | booted via ONENAND. This is not a must, some SoCs need this, | |
1123 | some not. | |
1124 | ||
1125 | config QSPI_BOOT | |
1126 | bool "Support for booting from QSPI flash" | |
7b6baa33 SG |
1127 | help |
1128 | Enabling this will make a U-Boot binary that is capable of being | |
1129 | booted via QSPI flash. This is not a must, some SoCs need this, | |
1130 | some not. | |
1131 | ||
1132 | config SATA_BOOT | |
1133 | bool "Support for booting from SATA" | |
7b6baa33 SG |
1134 | help |
1135 | Enabling this will make a U-Boot binary that is capable of being | |
1136 | booted via SATA. This is not a must, some SoCs need this, | |
1137 | some not. | |
1138 | ||
1139 | config SD_BOOT | |
1140 | bool "Support for booting from SD/EMMC" | |
7b6baa33 SG |
1141 | help |
1142 | Enabling this will make a U-Boot binary that is capable of being | |
1143 | booted via SD/EMMC. This is not a must, some SoCs need this, | |
1144 | some not. | |
1145 | ||
66e0e2b1 TR |
1146 | config SD_BOOT_QSPI |
1147 | bool "Support for booting from SD/EMMC and enable QSPI" | |
1148 | help | |
1149 | Enabling this will make a U-Boot binary that is capable of being | |
1150 | booted via SD/EMMC while enabling QSPI on the platform as well. This | |
1151 | is not a must, some SoCs need this, some not. | |
1152 | ||
7b6baa33 SG |
1153 | config SPI_BOOT |
1154 | bool "Support for booting from SPI flash" | |
7b6baa33 SG |
1155 | help |
1156 | Enabling this will make a U-Boot binary that is capable of being | |
1157 | booted via SPI flash. This is not a must, some SoCs need this, | |
1158 | some not. | |
1159 | ||
1160 | endmenu | |
1161 | ||
98eed0d4 SG |
1162 | menu "Autoboot options" |
1163 | ||
1164 | config AUTOBOOT | |
1165 | bool "Autoboot" | |
1166 | default y | |
1167 | help | |
1168 | This enables the autoboot. See doc/README.autoboot for detail. | |
1169 | ||
95fd4f33 SG |
1170 | config BOOTDELAY |
1171 | int "delay in seconds before automatically booting" | |
1172 | default 2 | |
1173 | depends on AUTOBOOT | |
1174 | help | |
1175 | Delay before automatically running bootcmd; | |
1176 | set to 0 to autoboot with no delay, but you can stop it by key input. | |
1177 | set to -1 to disable autoboot. | |
1178 | set to -2 to autoboot with no delay and not check for abort | |
1179 | ||
1180 | If this value is >= 0 then it is also used for the default delay | |
1181 | before starting the default entry in bootmenu. If it is < 0 then | |
1182 | a default value of 10s is used. | |
1183 | ||
1184 | See doc/README.autoboot for details. | |
1185 | ||
98eed0d4 SG |
1186 | config AUTOBOOT_KEYED |
1187 | bool "Stop autobooting via specific input key / string" | |
98eed0d4 SG |
1188 | help |
1189 | This option enables stopping (aborting) of the automatic | |
1190 | boot feature only by issuing a specific input key or | |
1191 | string. If not enabled, any input key will abort the | |
1192 | U-Boot automatic booting process and bring the device | |
1193 | to the U-Boot prompt for user input. | |
1194 | ||
d199c3ab SJ |
1195 | config AUTOBOOT_FLUSH_STDIN |
1196 | bool "Enable flushing stdin before starting to read the password" | |
1197 | depends on AUTOBOOT_KEYED && !SANDBOX | |
1198 | help | |
1199 | When this option is enabled stdin buffer will be flushed before | |
1200 | starting to read the password. | |
1201 | This can't be enabled for the sandbox as flushing stdin would | |
1202 | break the autoboot unit tests. | |
1203 | ||
98eed0d4 SG |
1204 | config AUTOBOOT_PROMPT |
1205 | string "Autoboot stop prompt" | |
1206 | depends on AUTOBOOT_KEYED | |
1207 | default "Autoboot in %d seconds\\n" | |
1208 | help | |
1209 | This string is displayed before the boot delay selected by | |
1210 | CONFIG_BOOTDELAY starts. If it is not defined there is no | |
1211 | output indicating that autoboot is in progress. | |
1212 | ||
1213 | Note that this define is used as the (only) argument to a | |
1214 | printf() call, so it may contain '%' format specifications, | |
1215 | provided that it also includes, sepearated by commas exactly | |
1216 | like in a printf statement, the required arguments. It is | |
1217 | the responsibility of the user to select only such arguments | |
1218 | that are valid in the given context. | |
1219 | ||
1220 | config AUTOBOOT_ENCRYPTION | |
1221 | bool "Enable encryption in autoboot stopping" | |
1222 | depends on AUTOBOOT_KEYED | |
1223 | help | |
1224 | This option allows a string to be entered into U-Boot to stop the | |
1a4a7786 SJ |
1225 | autoboot. |
1226 | The behavior depends whether CONFIG_CRYPT_PW from lib is enabled | |
1227 | or not. | |
1228 | In case CONFIG_CRYPT_PW is enabled, the string will be forwarded | |
1229 | to the crypt-based functionality and be compared against the | |
1230 | string in the environment variable 'bootstopkeycrypt'. | |
1231 | In case CONFIG_CRYPT_PW is disabled the string itself is hashed | |
1232 | and compared against the hash in the environment variable | |
1233 | 'bootstopkeysha256'. | |
1234 | If it matches in either case then boot stops and | |
1235 | a command-line prompt is presented. | |
98eed0d4 SG |
1236 | This provides a way to ship a secure production device which can also |
1237 | be accessed at the U-Boot command line. | |
1238 | ||
33198740 SJ |
1239 | config AUTOBOOT_SHA256_FALLBACK |
1240 | bool "Allow fallback from crypt-hashed password to sha256" | |
1241 | depends on AUTOBOOT_ENCRYPTION && CRYPT_PW | |
1242 | help | |
1243 | This option adds support to fall back from crypt-hashed | |
1244 | passwords to checking a SHA256 hashed password in case the | |
1245 | 'bootstopusesha256' environment variable is set to 'true'. | |
1246 | ||
98eed0d4 SG |
1247 | config AUTOBOOT_DELAY_STR |
1248 | string "Delay autobooting via specific input key / string" | |
1249 | depends on AUTOBOOT_KEYED && !AUTOBOOT_ENCRYPTION | |
1250 | help | |
1251 | This option delays the automatic boot feature by issuing | |
1252 | a specific input key or string. If CONFIG_AUTOBOOT_DELAY_STR | |
1253 | or the environment variable "bootdelaykey" is specified | |
1254 | and this string is received from console input before | |
1255 | autoboot starts booting, U-Boot gives a command prompt. The | |
1256 | U-Boot prompt will time out if CONFIG_BOOT_RETRY_TIME is | |
1257 | used, otherwise it never times out. | |
1258 | ||
1259 | config AUTOBOOT_STOP_STR | |
1260 | string "Stop autobooting via specific input key / string" | |
1261 | depends on AUTOBOOT_KEYED && !AUTOBOOT_ENCRYPTION | |
1262 | help | |
1263 | This option enables stopping (aborting) of the automatic | |
1264 | boot feature only by issuing a specific input key or | |
1265 | string. If CONFIG_AUTOBOOT_STOP_STR or the environment | |
1266 | variable "bootstopkey" is specified and this string is | |
1267 | received from console input before autoboot starts booting, | |
1268 | U-Boot gives a command prompt. The U-Boot prompt never | |
1269 | times out, even if CONFIG_BOOT_RETRY_TIME is used. | |
1270 | ||
1271 | config AUTOBOOT_KEYED_CTRLC | |
1272 | bool "Enable Ctrl-C autoboot interruption" | |
1273 | depends on AUTOBOOT_KEYED && !AUTOBOOT_ENCRYPTION | |
98eed0d4 SG |
1274 | help |
1275 | This option allows for the boot sequence to be interrupted | |
1276 | by ctrl-c, in addition to the "bootdelaykey" and "bootstopkey". | |
1277 | Setting this variable provides an escape sequence from the | |
1278 | limited "password" strings. | |
1279 | ||
6c0ce6d3 SJ |
1280 | config AUTOBOOT_NEVER_TIMEOUT |
1281 | bool "Make the password entry never time-out" | |
1282 | depends on AUTOBOOT_KEYED && AUTOBOOT_ENCRYPTION && CRYPT_PW | |
1283 | help | |
1284 | This option removes the timeout from the password entry | |
1285 | when the user first presses the <Enter> key before entering | |
1286 | any other character. | |
1287 | ||
1a4a7786 SJ |
1288 | config AUTOBOOT_STOP_STR_ENABLE |
1289 | bool "Enable fixed string to stop autobooting" | |
1290 | depends on AUTOBOOT_KEYED && AUTOBOOT_ENCRYPTION | |
1291 | help | |
1292 | This option enables the feature to add a fixed stop | |
1293 | string that is defined at compile time. | |
1294 | In every case it will be tried to load the stop | |
1295 | string from the environment. | |
1296 | In case this is enabled and there is no stop string | |
1297 | in the environment, this will be used as default value. | |
1298 | ||
1299 | config AUTOBOOT_STOP_STR_CRYPT | |
1300 | string "Stop autobooting via crypt-hashed password" | |
1301 | depends on AUTOBOOT_STOP_STR_ENABLE && CRYPT_PW | |
1302 | help | |
1303 | This option adds the feature to only stop the autobooting, | |
1304 | and therefore boot into the U-Boot prompt, when the input | |
1305 | string / password matches a values that is hashed via | |
1306 | one of the supported crypt-style password hashing options | |
1307 | and saved in the environment variable "bootstopkeycrypt". | |
1308 | ||
98eed0d4 | 1309 | config AUTOBOOT_STOP_STR_SHA256 |
25c8b9f2 | 1310 | string "Stop autobooting via SHA256 hashed password" |
1a4a7786 | 1311 | depends on AUTOBOOT_STOP_STR_ENABLE |
98eed0d4 SG |
1312 | help |
1313 | This option adds the feature to only stop the autobooting, | |
1314 | and therefore boot into the U-Boot prompt, when the input | |
1315 | string / password matches a values that is encypted via | |
652b504f JP |
1316 | a SHA256 hash and saved in the environment variable |
1317 | "bootstopkeysha256". If the value in that variable | |
1318 | includes a ":", the portion prior to the ":" will be treated | |
1319 | as a salt value. | |
98eed0d4 SG |
1320 | |
1321 | config AUTOBOOT_USE_MENUKEY | |
1322 | bool "Allow a specify key to run a menu from the environment" | |
1323 | depends on !AUTOBOOT_KEYED | |
1324 | help | |
1325 | If a specific key is pressed to stop autoboot, then the commands in | |
1326 | the environment variable 'menucmd' are executed before boot starts. | |
1327 | ||
1328 | config AUTOBOOT_MENUKEY | |
1329 | int "ASCII value of boot key to show a menu" | |
1330 | default 0 | |
1331 | depends on AUTOBOOT_USE_MENUKEY | |
1332 | help | |
1333 | If this key is pressed to stop autoboot, then the commands in the | |
1334 | environment variable 'menucmd' will be executed before boot starts. | |
1335 | For example, 33 means "!" in ASCII, so pressing ! at boot would take | |
1336 | this action. | |
1337 | ||
1338 | config AUTOBOOT_MENU_SHOW | |
1339 | bool "Show a menu on boot" | |
1340 | depends on CMD_BOOTMENU | |
1341 | help | |
1342 | This enables the boot menu, controlled by environment variables | |
1343 | defined by the board. The menu starts after running the 'preboot' | |
1344 | environmnent variable (if enabled) and before handling the boot delay. | |
1345 | See README.bootmenu for more details. | |
1346 | ||
83f73632 MK |
1347 | config BOOTMENU_DISABLE_UBOOT_CONSOLE |
1348 | bool "Disallow bootmenu to enter the U-Boot console" | |
1349 | depends on AUTOBOOT_MENU_SHOW | |
1350 | help | |
1351 | If this option is enabled, user can not enter the U-Boot console from | |
1352 | bootmenu. It increases the system security. | |
1353 | ||
69c8a817 TR |
1354 | config BOOT_RETRY |
1355 | bool "Boot retry feature" | |
1356 | help | |
1357 | Allow for having the U-Boot command prompt time out and attempt | |
1358 | to boot again. If the environment variable "bootretry" is found then | |
1359 | its value is used, otherwise the retry timeout is | |
1360 | CONFIG_BOOT_RETRY_TIME. CONFIG_BOOT_RETRY_MIN is optional and | |
1361 | defaults to CONFIG_BOOT_RETRY_TIME. All times are in seconds. | |
1362 | ||
1363 | config BOOT_RETRY_TIME | |
1364 | int "Timeout in seconds before attempting to boot again" | |
1365 | depends on BOOT_RETRY | |
1366 | help | |
1367 | Time in seconds before the U-Boot prompt will timeout and boot will | |
1368 | be attempted again. | |
1369 | ||
1370 | config BOOT_RETRY_MIN | |
1371 | int "Minimum timeout in seconds for 'bootretry'" | |
1372 | depends on BOOT_RETRY | |
1373 | default BOOT_RETRY_TIME | |
1374 | help | |
1375 | The minimum time in seconds that "bootretry" can be set to. | |
1376 | ||
1377 | config RESET_TO_RETRY | |
1378 | bool "Reset the board to retry autoboot" | |
1379 | depends on BOOT_RETRY | |
1380 | help | |
1381 | After the countdown timed out, the board will be reset to restart | |
1382 | again. | |
1383 | ||
98eed0d4 SG |
1384 | endmenu |
1385 | ||
98220743 PR |
1386 | menu "Image support" |
1387 | ||
1388 | config IMAGE_PRE_LOAD | |
1389 | bool "Image pre-load support" | |
1390 | help | |
1391 | Enable an image pre-load stage in the SPL. | |
1392 | This pre-load stage allows to do some manipulation | |
1393 | or check (for example signature check) on an image | |
1394 | before launching it. | |
1395 | ||
1396 | config SPL_IMAGE_PRE_LOAD | |
1397 | bool "Image pre-load support within SPL" | |
1398 | depends on SPL && IMAGE_PRE_LOAD | |
1399 | help | |
1400 | Enable an image pre-load stage in the SPL. | |
1401 | This pre-load stage allows to do some manipulation | |
1402 | or check (for example signature check) on an image | |
1403 | before launching it. | |
1404 | ||
1405 | config IMAGE_PRE_LOAD_SIG | |
1406 | bool "Image pre-load signature support" | |
1407 | depends on IMAGE_PRE_LOAD | |
1408 | select FIT_SIGNATURE | |
1409 | select RSA | |
1410 | select RSA_VERIFY_WITH_PKEY | |
1411 | help | |
1412 | Enable signature check support in the pre-load stage. | |
1413 | For this feature a very simple header is added before | |
1414 | the image with few fields: | |
1415 | - a magic | |
1416 | - the image size | |
1417 | - the signature | |
1418 | All other information (header size, type of signature, | |
1419 | ...) are provided in the node /image/pre-load/sig of | |
1420 | u-boot. | |
1421 | ||
1422 | config SPL_IMAGE_PRE_LOAD_SIG | |
1423 | bool "Image pre-load signature support witin SPL" | |
1424 | depends on SPL_IMAGE_PRE_LOAD && IMAGE_PRE_LOAD_SIG | |
1425 | select SPL_FIT_SIGNATURE | |
1426 | select SPL_RSA | |
1427 | select SPL_RSA_VERIFY_WITH_PKEY | |
1428 | help | |
1429 | Enable signature check support in the pre-load stage in the SPL. | |
1430 | For this feature a very simple header is added before | |
1431 | the image with few fields: | |
1432 | - a magic | |
1433 | - the image size | |
1434 | - the signature | |
1435 | All other information (header size, type of signature, | |
1436 | ...) are provided in the node /image/pre-load/sig of | |
1437 | u-boot. | |
1438 | ||
1439 | endmenu | |
1440 | ||
fe5db255 SG |
1441 | config USE_BOOTARGS |
1442 | bool "Enable boot arguments" | |
1443 | help | |
1444 | Provide boot arguments to bootm command. Boot arguments are specified | |
1445 | in CONFIG_BOOTARGS option. Enable this option to be able to specify | |
1446 | CONFIG_BOOTARGS string. If this option is disabled, CONFIG_BOOTARGS | |
1447 | will be undefined and won't take any space in U-Boot image. | |
1448 | ||
1449 | config BOOTARGS | |
1450 | string "Boot arguments" | |
1451 | depends on USE_BOOTARGS && !USE_DEFAULT_ENV_FILE | |
1452 | help | |
1453 | This can be used to pass arguments to the bootm command. The value of | |
1454 | CONFIG_BOOTARGS goes into the environment value "bootargs". Note that | |
1455 | this value will also override the "chosen" node in FDT blob. | |
1456 | ||
51bb3384 SG |
1457 | config BOOTARGS_SUBST |
1458 | bool "Support substituting strings in boot arguments" | |
1459 | help | |
1460 | This allows substituting string values in the boot arguments. These | |
1461 | are applied after the commandline has been built. | |
1462 | ||
1463 | One use for this is to insert the root-disk UUID into the command | |
1464 | line where bootargs contains "root=${uuid}" | |
1465 | ||
1466 | setenv bootargs "console= root=${uuid}" | |
1467 | # Set the 'uuid' environment variable | |
1468 | part uuid mmc 2:2 uuid | |
1469 | ||
1470 | # Command-line substitution will put the real uuid into the | |
1471 | # kernel command line | |
1472 | bootm | |
1473 | ||
fe5db255 SG |
1474 | config USE_BOOTCOMMAND |
1475 | bool "Enable a default value for bootcmd" | |
1476 | help | |
1477 | Provide a default value for the bootcmd entry in the environment. If | |
1478 | autoboot is enabled this is what will be run automatically. Enable | |
1479 | this option to be able to specify CONFIG_BOOTCOMMAND as a string. If | |
1480 | this option is disabled, CONFIG_BOOTCOMMAND will be undefined and | |
1481 | won't take any space in U-Boot image. | |
1482 | ||
1483 | config BOOTCOMMAND | |
1484 | string "bootcmd value" | |
1485 | depends on USE_BOOTCOMMAND && !USE_DEFAULT_ENV_FILE | |
a91492b6 SG |
1486 | default "bootflow scan -lb" if BOOTSTD_BOOTCOMMAND && CMD_BOOTFLOW_FULL |
1487 | default "bootflow scan" if BOOTSTD_BOOTCOMMAND && !CMD_BOOTFLOW_FULL | |
1488 | default "run distro_bootcmd" if !BOOTSTD_BOOTCOMMAND && DISTRO_DEFAULTS | |
fe5db255 SG |
1489 | help |
1490 | This is the string of commands that will be used as bootcmd and if | |
1491 | AUTOBOOT is set, automatically run. | |
1492 | ||
1493 | config USE_PREBOOT | |
1494 | bool "Enable preboot" | |
1495 | help | |
1496 | When this option is enabled, the existence of the environment | |
1497 | variable "preboot" will be checked immediately before starting the | |
1498 | CONFIG_BOOTDELAY countdown and/or running the auto-boot command resp. | |
1499 | entering interactive mode. | |
1500 | ||
1501 | This feature is especially useful when "preboot" is automatically | |
1502 | generated or modified. For example, the boot code can modify the | |
1503 | "preboot" when a user holds down a certain combination of keys. | |
1504 | ||
1505 | config PREBOOT | |
1506 | string "preboot default value" | |
1507 | depends on USE_PREBOOT && !USE_DEFAULT_ENV_FILE | |
87459da1 | 1508 | default "usb start" if USB_KEYBOARD |
fe5db255 SG |
1509 | default "" |
1510 | help | |
1511 | This is the default of "preboot" environment variable. | |
1512 | ||
2827c2f0 T |
1513 | config PREBOOT_DEFINED |
1514 | bool | |
1515 | default y if PREBOOT != "" | |
1516 | ||
832876a4 SG |
1517 | config DEFAULT_FDT_FILE |
1518 | string "Default fdt file" | |
1519 | help | |
1520 | This option is used to set the default fdt file to boot OS. | |
1521 | ||
12a3e1ad DS |
1522 | config SAVE_PREV_BL_FDT_ADDR |
1523 | depends on ARM | |
1524 | bool "Saves fdt address, passed by the previous bootloader, to env var" | |
1525 | help | |
1526 | When u-boot is used as a chain-loaded bootloader (replacing OS kernel), | |
1527 | enable this option to save fdt address, passed by the | |
1528 | previous bootloader for future use. | |
1529 | Address is saved to `prevbl_fdt_addr` environment variable. | |
1530 | ||
1531 | If no fdt was provided by previous bootloader, no env variables | |
1532 | will be created. | |
1533 | ||
1534 | config SAVE_PREV_BL_INITRAMFS_START_ADDR | |
1535 | depends on ARM | |
1536 | bool "Saves initramfs address, passed by the previous bootloader, to env var" | |
1537 | help | |
1538 | When u-boot is used as a chain-loaded bootloader(replacing OS kernel), | |
1539 | enable this option to save initramfs address, passed by the | |
1540 | previous bootloader for future use. | |
1541 | Address is saved to `prevbl_initrd_start_addr` environment variable. | |
1542 | ||
1543 | If no initramfs was provided by previous bootloader, no env variables | |
1544 | will be created. | |
1545 | ||
cf298167 | 1546 | endmenu # Booting |